Fabrice Benhamouda
Fabrice Benhamouda
Algorand Foundation
Geverifieerd e-mailadres voor normalesup.org - Homepage
Geciteerd door
Geciteerd door
Supporting private data on hyperledger fabric with secure multiparty computation
F Benhamouda, S Halevi, T Halevi
IBM Journal of Research and Development 63 (2/3), 3: 1-3: 8, 2019
F: Honest-majority maliciously secure framework for private deep learning
S Wagh, S Tople, F Benhamouda, E Kushilevitz, P Mittal, T Rabin
Proceedings on Privacy Enhancing Technologies 2021 (1), 188-208, 2021
New techniques for SPHFs and efficient one-round PAKE protocols
F Benhamouda, O Blazy, C Chevalier, D Pointcheval, D Vergnaud
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
Better zero-knowledge proofs for lattice encryption and their application to group signatures
F Benhamouda, J Camenisch, S Krenn, V Lyubashevsky, G Neven
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
Efficient zero-knowledge proofs for commitments from learning with errors over rings
F Benhamouda, S Krenn, V Lyubashevsky, K Pietrzak
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2016
Randomness complexity of private circuits for multiplication
S Belaïd, F Benhamouda, A Passelègue, E Prouff, A Thillard, D Vergnaud
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
Public‐key encryption indistinguishable under plaintext‐checkable attacks
M Abdalla, F Benhamouda, D Pointcheval
IET Information Security 10 (6), 288-303, 2016
Security of the J-PAKE password-authenticated key exchange protocol
M Abdalla, F Benhamouda, P MacKenzie
2015 IEEE Symposium on Security and Privacy, 571-587, 2015
Disjunctions for hash proof systems: New constructions and applications
M Abdalla, F Benhamouda, D Pointcheval
Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015
SPHF-friendly non-interactive commitments
M Abdalla, F Benhamouda, O Blazy, C Chevalier, D Pointcheval
International Conference on the Theory and Application of Cryptology and …, 2013
Can a public blockchain keep a secret?
F Benhamouda, C Gentry, S Gorbunov, S Halevi, H Krawczyk, C Lin, ...
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
On the (in) security of ROS
F Benhamouda, T Lepoint, J Loss, M Orrù, M Raykova
Journal of Cryptology 35 (4), 25, 2022
Decentralizing inner-product functional encryption
M Abdalla, F Benhamouda, M Kohlweiss, H Waldner
Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019
k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits
F Benhamouda, H Lin
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
A new framework for privacy-preserving aggregation of time-series data
F Benhamouda, M Joye, B Libert
ACM Transactions on Information and System Security (TISSEC) 18 (3), 1-21, 2016
On the local leakage resilience of linear secret sharing schemes
F Benhamouda, A Degwekar, Y Ishai, T Rabin
Journal of Cryptology 34, 1-65, 2021
From single-input to multi-client inner-product functional encryption
M Abdalla, F Benhamouda, R Gay
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
CCA-secure inner-product functional encryption from projective hash functions
F Benhamouda, F Bourse, H Lipmaa
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages
F Ben Hamouda, O Blazy, C Chevalier, D Pointcheval, D Vergnaud
Public-Key Cryptography–PKC 2013, 272-291, 2013
Hash proof systems over lattices revisited
F Benhamouda, O Blazy, L Ducas, W Quach
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20